Vulnerability Description
A use-after-free in the _zip_dirent_read function of zip_dirent.c in libzip 1.2.0 allows attackers to have an unspecified impact by attempting to unzip a malformed ZIP archive. NOTE: the discoverer states "This use-after-free is triggered prior to the double free reported in CVE-2017-12858."
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libzip | Libzip | 1.2.0 |
Related Weaknesses (CWE)
References
- https://github.com/nih-at/libzip/commit/2217022b7d1142738656d891e00b3d2d9179b796PatchThird Party Advisory
- https://github.com/nih-at/libzip/issues/5Third Party Advisory
- https://libzip.org/libzip-discuss/Release NotesVendor Advisory
- https://github.com/nih-at/libzip/commit/2217022b7d1142738656d891e00b3d2d9179b796PatchThird Party Advisory
- https://github.com/nih-at/libzip/issues/5Third Party Advisory
- https://libzip.org/libzip-discuss/Release NotesVendor Advisory
FAQ
What is CVE-2019-17582?
CVE-2019-17582 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A use-after-free in the _zip_dirent_read function of zip_dirent.c in libzip 1.2.0 allows attackers to have an unspecified impact by attempting to unzip a malformed ZIP archive. NOTE: the discoverer st...
How severe is CVE-2019-17582?
CVE-2019-17582 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-17582?
Check the references section above for vendor advisories and patch information. Affected products include: Libzip Libzip.